find-bugs

在本地分支变更中查找错误、安全漏洞和代码质量问题。适用于审查变更、查找错误、安全审查或审计当前分支代码时使用。

查看详情
name:find-bugsdescription:"Find bugs, security vulnerabilities, and code quality issues in local branch changes. Use when asked to review changes, find bugs, security review, or audit code on the current branch."source:"https://github.com/getsentry/skills/tree/main/plugins/sentry-skills/skills/find-bugs"risk:safe

Find Bugs

Review changes on this branch for bugs, security vulnerabilities, and code quality issues.

When to Use This Skill

Use this skill when:

  • Asked to review changes

  • Finding bugs in code

  • Performing security reviews

  • Auditing code on the current branch

  • Reviewing pull request changes
  • Phase 1: Complete Input Gathering

  • Get the FULL diff: git diff $(gh repo view --json defaultBranchRef --jq '.defaultBranchRef.name')...HEAD

  • If output is truncated, read each changed file individually until you have seen every changed line

  • List all files modified in this branch before proceeding
  • Phase 2: Attack Surface Mapping

    For each changed file, identify and list:

    All user inputs (request params, headers, body, URL components)
    All database queries
    All authentication/authorization checks
    All session/state operations
    All external calls
    All cryptographic operations

    Phase 3: Security Checklist (check EVERY item for EVERY file)

    [ ] Injection: SQL, command, template, header injection
    [ ] XSS: All outputs in templates properly escaped?
    [ ] Authentication: Auth checks on all protected operations?
    [ ] Authorization/IDOR: Access control verified, not just auth?
    [ ] CSRF: State-changing operations protected?
    [ ] Race conditions: TOCTOU in any read-then-write patterns?
    [ ] Session: Fixation, expiration, secure flags?
    [ ] Cryptography: Secure random, proper algorithms, no secrets in logs?
    [ ] Information disclosure: Error messages, logs, timing attacks?
    [ ] DoS: Unbounded operations, missing rate limits, resource exhaustion?
    [ ] Business logic: Edge cases, state machine violations, numeric overflow?

    Phase 4: Verification

    For each potential issue:

    Check if it's already handled elsewhere in the changed code
    Search for existing tests covering the scenario
    Read surrounding context to verify the issue is real

    Phase 5: Pre-Conclusion Audit

    Before finalizing, you MUST:

  • List every file you reviewed and confirm you read it completely

  • List every checklist item and note whether you found issues or confirmed it's clean

  • List any areas you could NOT fully verify and why

  • Only then provide your final findings
  • Output Format

    Prioritize: security vulnerabilities > bugs > code quality

    Skip: stylistic/formatting issues

    For each issue:

    File:Line - Brief description
    Severity: Critical/High/Medium/Low
    Problem: What's wrong
    Evidence: Why this is real (not already fixed, no existing test, etc.)
    Fix: Concrete suggestion
    References: OWASP, RFCs, or other standards if applicable

    If you find nothing significant, say so - don't invent issues.

    Do not make changes - just report findings. I'll decide what to address.

      find-bugs - Agent Skills